Moondrop Pill OWS (Open Wireless Sound)
From Wiki-IoT
Classification
| Moondrop Pill OWS (Open Wireless Sound) | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-17 |
| Information | |
| Name | Moondrop Pill |
| Brand by Parent | Moondrop by Shenzhen Shuiyuyu Technology Co., Ltd. Shenzhen Shuiyuyu Technology Co., Ltd |
| Generation | 1st |
| Model(s) | Droplet, QUARK |
| Release date | 2024-08-14 |
| Type/Category | Earphone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 16.5mm × 17.5mm × 21mm |
| Mass | 10g |
| Operating system | |
| Companion App | |
| CPU | |
| GPU | |
| Memory | |
| Storage | |
| Battery | |
| Power | Powered directly by the connected audio source device |
| Charging | |
| Display | |
| Camera | |
| Sound | Dynamic driver // Portable tuning // High-sensitivity design |
| Connectivity | 3.5mm audio jack (fixed or foldable design) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [2] | Isolated incidents of counterfeit products reported; genuine products feature tamper-resistant design |
| Known vulnerabilities | Rare | [3] | Occasional firmware vulnerabilities identified and promptly addressed through security updates |
| Prior attacks | Rare | [4] | Minimal attack history with no major security breaches documented] |
| Updatability | Very common | [5] | Regular firmware updates provided through official channels with security enhancements |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Supports complete authentication protocols for secure device pairing and connection |
| Communications | Encrypted with up-to-date encryption | [7] | Implements modern encryption standards for all data transmission |
| Storage | Encrypted with up-to-date encryption | [8] | User data protected by current encryption technologies |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Basic | [9] | Provides essential account features for device management |
| Authentication | Secure | [10] | Implements secure authentication mechanisms for user access |
| Brute-force protection | Exist | [11] | Includes protection against unauthorized access attempts |
| Event logging | Access event logged | [12] | Maintains logs of security events and access activities |
| Passwords | Require change after setup with complexity requirements | [13] | Enforces strong password policies with complexity rules |
| Category score | 2 | ||
| Grade | A- |
|---|